Previous cyberattack victims of known ransomware BlackByte can rejoice since a free decryptor has been released to the public. If the decryptor is executed, ransomware will generate an original encryption key per file or a key per machine called session keys utilized to encrypt a target’s device. These keys are then encrypted with a public Rivest–Shamir–Adleman key and attached to the end...Continue Reading
Currently, the OpenSea marketplace is at risk of being infiltrated by threat actors. Uploading malicious non-fungible tokens or NFT can become a transmitter for hackers attempting to heist digital wallet funds. Severe security issues inside the OpenSea non-fungible token marketplace that enabled attackers to gather cryptocurrency wallet funds have been patched. Meanwhile, the non-fungible tokens, also known as NFT, are digitally owned...Continue Reading
REvil ransomware group, Russia’s most notorious cybercriminal gang, known for their extortions, has shut down again after an unidentified individual hijacked their data leak blog and the onion router payment portal. The ‘The onion router’ shuts down recently. A malicious actor associated with the REvil group announces that somebody caused problems to the ransomware group’s domain to the XSS...Continue Reading
Illegal services that allow threat actors to evade the protection that two-factor authentication (2FA) brings are rampant in underground forums. While 2FA is the most helpful method of protecting a user’s privacy against criminals hacking into their accounts, threat actors have also found a way to sidestep the protection. One of these is the usage of bots...Continue Reading
This year has been challenging for businesses, especially with the pandemic outbreak. Several threat actors have taken advantage of executing cyberattacks against organizations worldwide, ransomware being the most common type. System of government such as the Commonwealth of Independent States (CIS) also failed to avoid such unfortunate occurrences of attacks for this year. Businesses that operate inside the CIS have been the targets of non-prevalent ransomware threat groups. Described below is...Continue Reading
The latest research has found a new data exfiltration mechanism that utilizes Ethernet cables as a transmitting antenna tool in siphoning sensitive data furtively from air-gapped systems. A security analyst stated that it is an interesting concern how the wires that are supposed to protect air-gap systems become the cause of vulnerability in attacks. This new data exfiltration mechanism called “LANtenna Attack” allows malicious codes found in...Continue Reading
Neiman Marcus, an American luxury department store chain in the ownership of Neiman Marcus Group (NMG) located in Dallas, Texas, has warned millions of their worldwide clients about their online accounts being susceptible to a major data breach. The impacted customers have reached over 4.6 million people, of which they have sent notifications regarding the attack that may have begun by May last year. From the...Continue Reading
One of Europe’s largest customer care and call centre providers, GSS, has undergone a devastating ransomware attack resulting in a massive freeze in its IT systems and has halted call centre services across its Spanish-speaking customer base. GSS is also a Spanish and Latin America division of the Covisian firm. This week, many call centres and...Continue Reading
REvil, a private ransomware-as-a-service (RaaS) group from Russia, has reportedly come back to its operations intending to cheat on its affiliates. According to reports made by security researchers, the ransomware gang cheats on its partners so they will be able to rob all ransom payments from their victims. The operators of the REvil RaaS were...Continue Reading
Microsoft reported a newly found Phishing-as-a-Service operation last Tuesday, which has used a high-volume 300,000 distinct and newly created subdomains that are operated in a single run. According to the tech giant, they discovered the campaign amid their research about phishing attacks triggered by the phishing-as-a-service operation named BulletProofLink. The procedure is reported to be offering low-cost domain hosting,...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.